OpaqueVEIL

OpaqueVEIL

TecSec
+
+

Related Products

  • Google Chrome Enterprise
    2,062 Ratings
    Visit Website
  • HERE Enterprise Browser
    2 Ratings
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website
  • StrongDM
    102 Ratings
    Visit Website
  • 1Password
    16,707 Ratings
    Visit Website
  • Jscrambler
    40 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,936 Ratings
    Visit Website
  • DriveStrike
    24 Ratings
    Visit Website
  • Keeper Security
    1,764 Ratings
    Visit Website
  • Unimus
    31 Ratings
    Visit Website

About

CKM® Runtime Environment, the core of TecSec’s Constructive Key Management® (CKM®) system, has an updated name! In an every changing market that is becoming more knowledgeable about security solutions, standards and products, TecSec has made a name change for our core technology in order to avoid any confusion between CKM the standard and CKM®, the product. CKM® Runtime Environment (RTE) is now known as OpaqueVEIL® and is the core of the VEIL® suite of products. The VEIL® suite, like its predecessor is a standards-based and patented cryptographic key management technology that provides information security and access control through cryptography. OpaqueVEIL®, as the underlying technology of all CKM Enabled® products, is comprised of a collection of software components that are required to utilize CKM technology. OpaqueVEIL® masks the detailed inner workings of cryptography and key management, making the results simple and programmer-friendly.

About

data² is an AI-powered enterprise analytics and decision-intelligence platform designed to unify fragmented data sources and generate transparent, explainable insights for complex operational environments. It is built around explainable AI (eXAI), which allows organizations to understand not only what an AI model predicts but also why it reached a particular conclusion, providing traceable evidence behind each recommendation. Its flagship platform, reView, aggregates data from multiple systems across an organization and transforms it into a unified intelligence framework where relationships between datasets can be analyzed and visualized. This approach allows users to rapidly interpret large and complex datasets while maintaining full traceability back to the original sources of information. It emphasizes “hallucination-resistant” AI, meaning that conclusions are grounded in verifiable data rather than opaque model outputs.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Computer Security software for businesses

Audience

Government agencies, enterprise analysts, and organizations operating in high-stakes environments that need explainable AI analytics to unify complex data and generate traceable, trustworthy insights for decision-making

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

TecSec
United States
www.tecsec.com

Company Information

data²
Founded: 2023
United States
www.data2.ai/

Alternatives

Alternatives

DataChain

DataChain

iterative.ai

Categories

Categories

Computer Security Features

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Integrations

No info available.

Integrations

No info available.
Claim OpaqueVEIL and update features and information
Claim OpaqueVEIL and update features and information
Claim data² and update features and information
Claim data² and update features and information